Filters
Question type

8,Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.

A) True
B) False

Correct Answer

verifed

verified

A key logical component of an IDS is:


A) sensors
B) analyzers
C) user interface
D) all of the above

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

D

IEEE 802.11i consists of two main functions: authentication and access control.

A) True
B) False

Correct Answer

verifed

verified

A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.

A) True
B) False

Correct Answer

verifed

verified

A stateful inspection firewall


A) applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B) controls TCP traffic by creating a directory of outbound TCP connections
C) acts as a relay of application-level traffic
D) sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

IEEE 802.11i makes use of another standard that was designed to provide access control functions for LANs.The standard is .

Correct Answer

verifed

verified

IEEE 802.1...

View Answer

The WiFi standard known as Privacy with message integrity can be described as follows:


A) A way of ensuring the privacy of the individual using WiFi
B) A technique that ensures that the data transmitted using WiFi have not been altered
C) A way of providing mutual authentication between a user and an AS
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

B

SSL is designed to make use of TCP to provide .

Correct Answer

verifed

verified

a reliable...

View Answer

For VPNs,both authentication and are generally desired.

Correct Answer

verifed

verified

SSL performs encryption first,followed by computing a message authentication code.

A) True
B) False

Correct Answer

verifed

verified

The firewall cannot protect against attacks that the firewall

Correct Answer

verifed

verified

The higher-layer protocols defined as part of SSL include:


A) handshake protocol
B) change cipher spec protocol
C) alert protocol
D) all of the above

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

IPSec provides authentication,encryption,and key exchange functions.

A) True
B) False

Correct Answer

verifed

verified

Transport mode in IPSec provides protection to the entire IP packet.

A) True
B) False

Correct Answer

verifed

verified

False

IPSec transport mode provides protection primarily for:


A) the Internet layer
B) upper-layer protocols
C) network and link-layer protocols
D) all of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

A) True
B) False

Correct Answer

verifed

verified

Ipsec is based primarily upon the DES standard.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a central element of a typical antivirus scheme


A) detection
B) identification
C) removal
D) deterrence

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 18 of 18

Related Exams

Show Answer